Sciweavers

382 search results - page 8 / 77
» Rule-based static analysis of network protocol implementatio...
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols
Abstract—This paper presents a protocol-independent approach to reveal a new insight into the performance of carrier sense multiple access with collision avoidance (CSMA/CA) prot...
Yu Cheng, Xinhua Ling, Weihua Zhuang
MOBIHOC
2002
ACM
15 years 9 months ago
Performance analysis of the CONFIDANT protocol
: Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate...
Sonja Buchegger, Jean-Yves Le Boudec
SAS
2000
Springer
15 years 1 months ago
A Transformational Approach for Generating Non-linear Invariants
Computing invariants is the key issue in the analysis of infinite-state systems whether analysis means testing, verification or parameter synthesis. In particular, methods that all...
Saddek Bensalem, Marius Bozga, Jean-Claude Fernand...
81
Voted
VMCAI
2005
Springer
15 years 3 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
74
Voted
TJS
2002
118views more  TJS 2002»
14 years 9 months ago
On the Design, Development, Deployment, and Network Survivability Analysis of the Dynamic Routing System Protocol
: With the ever-increasing demands on server applications, reliability is of paramount importance. Often these services are implemented using a distributed server cluster architect...
Abdur Chowdhury, Ophir Frieder, Peng-Jun Wan